Name | Modified | Size | Downloads / Week |
---|---|---|---|
Parent folder | |||
README.md | 2025-09-16 | 27.8 kB | |
v0.7.0 - 2025-09-16 - Enterprise Multi-Tenancy, RBAC, Teams, SSO source code.tar.gz | 2025-09-16 | 5.8 MB | |
v0.7.0 - 2025-09-16 - Enterprise Multi-Tenancy, RBAC, Teams, SSO source code.zip | 2025-09-16 | 6.5 MB | |
Totals: 3 Items | 12.4 MB | 0 |
MCP Gateway v0.7.0 - 2025-09-16 - Enterprise Multi-Tenancy, RBAC, Teams, SSO
This release delivers 50+ resolved issues and represents a fundamental architectural transformation of MCP Gateway from a single-tenant system into a multi-tenant platform with comprehensive team-based resource scoping, enterprise SSO integration, and advanced database support.
π Enterprise Multi-Tenancy & Security Achievements
This release implements [EPIC [#860]]: Complete Enterprise Multi-Tenancy System with Team-Based Resource Scoping, transforming MCP Gateway into a true enterprise platform (Architecture Guide) with:
- π Complete Authentication System β Email-based authentication with Argon2id password hashing replacing basic auth
- π₯ Multi-Tenant Team Management β Full team lifecycle with personal teams, invitations, and role-based access control
- π Three-Tier Resource Visibility β Private/Team/Public resource scoping across all entity types
- π Multi-Provider SSO Framework β GitHub, Google, and IBM Security Verify integration with domain trust
- ποΈ Enhanced Database Support β Complete MariaDB and MySQL production support alongside PostgreSQL and SQLite
- π Advanced JWT Security β Asymmetric algorithms (RSA, ECDSA) with audience verification and dynamic client registration
- β‘ Performance Optimizations β Database connection pooling configuration for multi-tenant workloads
β¨ Highlights
- π Email Authentication System β Complete user authentication with Argon2id password hashing and configurable password policies (#544, [#426])
- π₯ Complete RBAC & Team System β Platform Admin, Team Owner, Team Member roles with comprehensive multi-tenancy (#283, [#860])
- π Multi-Provider SSO Integration β GitHub, Google, and IBM Security Verify with enterprise domain trust (#220, [#278], [#859])
- π Asymmetric JWT Support β RSA and ECDSA algorithms with enterprise security features and audience verification
- ποΈ MariaDB & MySQL Support β Complete production support for MySQL-compatible databases with all features (#925)
- π Per-Virtual-Server API Keys β Scoped access tokens for individual virtual servers with team context (#282)
- π Enhanced Database Schema β Multi-tenant optimized with proper indexing and performance considerations
π¨ Important Migration Notice
- Major Database Migration β This release requires database schema migration from single-tenant to multi-tenant
- Authentication Changes β Migration from username to email-based authentication system
- Configuration Updates β New environment variables required for multi-tenancy features
- Complete Migration Guide β See
MIGRATION-0.7.0.md
for detailed upgrade instructions
π Added
π Authentication & Authorization System
- Email-based User Authentication (#544) β Complete replacement of basic auth with email/password system using Argon2id hashing
- Complete RBAC Implementation (#283) β Platform Admin, Team Owner, Team Member roles with full permission system
- Enhanced JWT Token System (#87) β JWT tokens with team context, scoped permissions, and per-user expiry management
- Asymmetric JWT Algorithm Support β Complete support for enterprise security: ```bash # Multiple algorithm support: JWT_ALGORITHM=HS256 # HMAC (existing, default) JWT_ALGORITHM=RS256 # RSA public/private key JWT_ALGORITHM=ES256 # ECDSA public/private key
# Enterprise features:
JWT_AUDIENCE=mcpgateway-api # Audience claim validation
JWT_ISSUER=mcpgateway # Issuer claim validation
* **Password Policy Engine** (#426) β Configurable security requirements with complexity rules:
bash
PASSWORD_MIN_LENGTH=8
PASSWORD_REQUIRE_UPPERCASE=false
PASSWORD_REQUIRE_LOWERCASE=false
PASSWORD_REQUIRE_NUMBERS=false
PASSWORD_REQUIRE_SPECIAL=false
* **Account Security Features** β Failed login attempt limits and account lockout policies:
bash
MAX_FAILED_LOGIN_ATTEMPTS=5
ACCOUNT_LOCKOUT_DURATION_MINUTES=30
```
* Password Change API β Secure endpoint for changing user passwords with old password verification
π₯ Team Management System
- Personal Teams Auto-Creation β Every user automatically receives a personal team on registration
- Multi-Team Membership β Users can belong to multiple teams with different roles (owner/member)
- Team Invitation System β Email-based invitations with secure tokens and configurable expiration:
bash INVITATION_EXPIRY_DAYS=7 REQUIRE_EMAIL_VERIFICATION_FOR_INVITES=true
- Team Visibility Controls β Private/Public team discovery enabling cross-team collaboration
- Team Administration API β Complete CRUD operations for teams, memberships, and invitations
- Team Limits Configuration:
bash MAX_TEAMS_PER_USER=50 MAX_MEMBERS_PER_TEAM=100
π Resource Scoping & Visibility
- Three-Tier Visibility System applied to all resource types:
- Private: Owner-only access for sensitive resources
- Team: Team member access for collaborative work
- Public: Cross-team access for organization-wide sharing
- Comprehensive Resource Coverage β Tools, Servers, Resources, Prompts, A2A Agents all support visibility scoping
- Team-Scoped API Endpoints β All APIs enhanced with proper access validation and team-based filtering
- Cross-Team Resource Discovery β Public resources discoverable across teams for collaboration
π Multi-Provider SSO Framework
- GitHub OAuth Integration (#278) β Complete GitHub SSO with organization support (Tutorial):
bash SSO_GITHUB_ENABLED=true SSO_GITHUB_CLIENT_ID=your-github-client-id SSO_GITHUB_CLIENT_SECRET=your-github-client-secret
- Google OAuth Integration (#278) β Google Workspace and personal account support (Tutorial):
bash SSO_GOOGLE_ENABLED=true SSO_GOOGLE_CLIENT_ID=your-google-client-id.googleusercontent.com SSO_GOOGLE_CLIENT_SECRET=your-google-client-secret
- IBM Security Verify Integration (#859) β Enterprise OIDC integration (Tutorial):
bash SSO_IBM_VERIFY_ENABLED=true SSO_IBM_VERIFY_CLIENT_ID=your-ibm-verify-client-id SSO_IBM_VERIFY_CLIENT_SECRET=your-ibm-verify-client-secret SSO_IBM_VERIFY_ISSUER=https://your-tenant.verify.ibm.com/oidc/endpoint/default
- Okta OIDC Integration β Enterprise identity provider support (Tutorial):
bash SSO_OKTA_ENABLED=true SSO_OKTA_CLIENT_ID=your-okta-client-id SSO_OKTA_CLIENT_SECRET=your-okta-client-secret SSO_OKTA_ISSUER=https://your-okta-domain.okta.com
- Enterprise Domain Features:
bash SSO_TRUSTED_DOMAINS=[] # JSON array of trusted email domains SSO_AUTO_ADMIN_DOMAINS=[] # Email domains for auto admin privileges SSO_GITHUB_ADMIN_ORGS=[] # GitHub orgs for admin privileges SSO_GOOGLE_ADMIN_DOMAINS=[] # Google Workspace domains for admin SSO_AUTO_CREATE_USERS=true # Auto-create users on first SSO login SSO_PRESERVE_ADMIN_AUTH=true # Keep local admin auth when SSO enabled SSO_REQUIRE_ADMIN_APPROVAL=false # Require admin approval for new users
ποΈ Platform Administration
- Platform Admin Role β System-wide management capabilities separate from team roles
- Domain-Based Auto-Assignment β Automatic platform admin assignment via SSO domain configuration
- Enterprise Domain Trust β Controlled access via trusted domain configuration
- System-Wide Team Management β Administrative oversight of all teams and memberships
ποΈ Enhanced Database Support
- Complete MariaDB Support (#925) β Full production support for MariaDB 12.0+ with all MCP Gateway features:
bash # MariaDB configuration: DATABASE_URL=mysql+pymysql://mysql:changeme@localhost:3306/mcp
- Complete MySQL Support (#925) β Full production support for MySQL 8.4+ with feature parity:
bash # MySQL configuration: DATABASE_URL=mysql+pymysql://mysql:changeme@localhost:3306/mcp
- Database Connection Pool Configuration β Optimized settings for multi-tenant workloads:
bash DB_POOL_SIZE=200 # Maximum persistent connections (optimized for SQLite) DB_MAX_OVERFLOW=5 # Additional connections beyond pool_size (reduced for SQLite) DB_POOL_TIMEOUT=60 # Seconds to wait for connection (increased for reliability) DB_POOL_RECYCLE=3600 # Seconds before recreating connection DB_MAX_RETRIES=5 # Maximum database retry attempts (increased for stability) DB_RETRY_INTERVAL_MS=2000 # Retry interval in milliseconds
- 36+ Database Tables β All tables fully compatible with MariaDB, MySQL, PostgreSQL, and SQLite
- Resolved VARCHAR Issues β All MySQL compatibility issues resolved for production deployments
π Per-Virtual-Server API Keys
- Scoped API Tokens (#282) β Individual API keys for each virtual server with team context
- Token Usage Tracking β Comprehensive logging and monitoring of API token usage
- Token Revocation System β Secure token lifecycle management with revocation capabilities
- Team-Scoped Permissions β API tokens inherit team permissions and visibility rules
π Changed
π Authentication Migration
- Username to Email Migration β All authentication now uses email addresses: ```bash # OLD (v0.6.0 and earlier): python3 -m mcpgateway.utils.create_jwt_token --username admin --exp 10080
# NEW (v0.7.0+): python3 -m mcpgateway.utils.create_jwt_token --username admin@example.com --exp 10080 ``` * JWT Token Format Enhanced β Tokens now include team context, user roles, and scoped permissions * API Authentication Updated β All documentation and examples updated for email-based authentication
π Database Schema Evolution
- New Multi-Tenant Tables β email_users, email_teams, email_team_members, email_team_invitations
- Enhanced Token Management β email_api_tokens, token_usage_logs, token_revocations for complete lifecycle tracking
- Extended Resource Tables β All resource tables include team_id, owner_email, visibility columns
- Performance Indexing β Strategic indexes on team_id, owner_email, visibility for optimal query performance
- Migration Scripts β Automated Alembic migrations with rollback support and verification
π API Enhancements
- New Authentication Endpoints β Complete email registration, login, and password management APIs
- New Team Management Endpoints β Full CRUD operations for teams, memberships, and invitations
- Enhanced Resource Endpoints β All resource endpoints support team-scoping and visibility parameters
- New SSO Endpoints β OAuth callback handlers for GitHub, Google, and IBM Security Verify
- Backward Compatibility β Existing API endpoints remain functional with progressive enhancement
π Fixed
π¨ Critical Multi-Tenancy Fixes
- Backend Multi-Tenancy Issues (#969) β Fixed critical bugs in team-based resource scoping and visibility implementation
- UI Multi-Tenancy Gaps (#967) β Added missing visibility fields and team selection throughout Admin UI
- Team Selection Implementation (#955) β Fixed team selection not properly tagging and loading resources
- Incomplete Visibility Implementation (#958) β Completed visibility system across all resource types
π§ Authentication & Security Fixes
- OAuth MCP Server Tool Invocation (#949) β Fixed tool invocation failures for OAuth2-authenticated MCP servers
- OAuth2 Server Status Display (#948) β Fixed OAuth2 authenticated servers showing as offline after addition
- JWT Token Scoping (#941) β Fixed access token scoping issues with proper team context
- DateTime UTC Issues (#942) β Fixed UTC datetime handling across authentication and team systems
π₯οΈ UI/UX Improvements
- Metadata Field Population (#954) β Fixed metadata fields not being populated in resource views
- Server Creation UUID Handling (#844, [#820]) β Fixed UUID format issues in server creation and editing
- Tool Configuration Updates (#834) β Fixed existing tool configurations not updating after MCP server changes
- Global Tools Synchronization (#831) β Fixed newly added/deleted tools not reflecting in Global Tools tab
π Infrastructure & Performance
- Sleep Jitter Method Call (#822) β Fixed incorrect method call in connection retry logic
- Container Base Image Migration (#928) β Migrated from UBI9 to UBI10 and Python 3.11 to 3.12
- Helm Kubernetes Version Support (#931) β Fixed Helm install issues with vendor-specific Kubernetes version suffixes
π Security Enhancements
- Data Isolation β Complete team-scoped queries prevent cross-tenant data access
- Resource Ownership Validation β Every resource has verified owner_email and team_id
- Visibility Enforcement β Private/Team/Public visibility strictly enforced at database and API levels
- Secure Token Management β Invitation tokens with expiration, single-use validation, and secure storage
- Domain Restrictions β Corporate domain enforcement via SSO_TRUSTED_DOMAINS configuration
- MFA Support β Automatic enforcement of SSO provider MFA policies
- Argon2id Password Hashing β Industry-standard password hashing with configurable parameters
π Documentation
- Complete SSO Integration Tutorials:
- SSO Configuration Guide β General SSO configuration and best practices
- GitHub OAuth Tutorial β Step-by-step GitHub OAuth setup
- Google OAuth Tutorial β Google Workspace and personal account configuration
- IBM Security Verify Tutorial β Enterprise IBM Security Verify OIDC integration
- Okta Tutorial β Okta OIDC provider configuration
- Architecture Documentation:
- Multi-Tenancy Architecture β Complete multi-tenant system design and implementation
- OAuth Design β OAuth2 architecture and security considerations
- Migration Documentation β
MIGRATION-0.7.0.md
with complete upgrade instructions - Configuration Reference β Comprehensive environment variable documentation in
.env.example
- API Reference Updates β Team-scoped endpoint documentation with examples
π¦ Migration Guide
β οΈ Pre-Migration Requirements
IMPORTANT: This is a major architectural change requiring database migration and configuration updates.
- Backup Everything: ```bash # Backup database cp mcp.db mcp.db.backup.$(date +%Y%m%d_%H%M%S)
# Backup configuration cp .env .env.bak ```
- Review Breaking Changes:
- Database schema changes (automatically migrated)
- Email-based authentication (manual token generation updates required)
- New configuration variables (required for multi-tenancy)
π Environment Configuration Updates
Update your .env
file with new multi-tenancy settings:
:::bash
#####################################
# Email-Based Authentication
#####################################
# Enable email-based authentication system
EMAIL_AUTH_ENABLED=true
# Platform admin user (bootstrap from environment)
PLATFORM_ADMIN_EMAIL=admin@example.com
PLATFORM_ADMIN_PASSWORD=changeme
PLATFORM_ADMIN_FULL_NAME=Platform Administrator
# Argon2id Password Hashing Configuration
ARGON2ID_TIME_COST=3
ARGON2ID_MEMORY_COST=65536
ARGON2ID_PARALLELISM=1
# Password Policy Configuration
PASSWORD_MIN_LENGTH=8
PASSWORD_REQUIRE_UPPERCASE=false
PASSWORD_REQUIRE_LOWERCASE=false
PASSWORD_REQUIRE_NUMBERS=false
PASSWORD_REQUIRE_SPECIAL=false
# Account Security
MAX_FAILED_LOGIN_ATTEMPTS=5
ACCOUNT_LOCKOUT_DURATION_MINUTES=30
#####################################
# Team Management
#####################################
# Enable automatic personal team creation for new users
AUTO_CREATE_PERSONAL_TEAMS=true
# Personal team naming prefix
PERSONAL_TEAM_PREFIX=personal
# Team Limits
MAX_TEAMS_PER_USER=50
MAX_MEMBERS_PER_TEAM=100
# Team Invitation Settings
INVITATION_EXPIRY_DAYS=7
REQUIRE_EMAIL_VERIFICATION_FOR_INVITES=true
#####################################
# Database Configuration (Optional)
#####################################
# Enhanced connection pooling for multi-tenant workloads
DB_POOL_SIZE=200 # Maximum persistent connections (optimized for SQLite)
DB_MAX_OVERFLOW=5 # Additional connections beyond pool_size (reduced for SQLite)
DB_POOL_TIMEOUT=60 # Seconds to wait for connection (increased for reliability)
DB_POOL_RECYCLE=3600 # Seconds before recreating connection
DB_MAX_RETRIES=5 # Maximum database retry attempts (increased for stability)
DB_RETRY_INTERVAL_MS=2000 # Retry interval in milliseconds
# MariaDB/MySQL Support (if migrating from SQLite/PostgreSQL)
# DATABASE_URL=mysql+pymysql://mysql:changeme@localhost:3306/mcp
#####################################
# SSO Configuration (Optional)
#####################################
# Master SSO switch
SSO_ENABLED=false
# GitHub OAuth
SSO_GITHUB_ENABLED=false
# SSO_GITHUB_CLIENT_ID=your-github-client-id
# SSO_GITHUB_CLIENT_SECRET=your-github-client-secret
# Google OAuth
SSO_GOOGLE_ENABLED=false
# SSO_GOOGLE_CLIENT_ID=your-google-client-id.googleusercontent.com
# SSO_GOOGLE_CLIENT_SECRET=your-google-client-secret
# IBM Security Verify OIDC
SSO_IBM_VERIFY_ENABLED=false
# SSO_IBM_VERIFY_CLIENT_ID=your-ibm-verify-client-id
# SSO_IBM_VERIFY_CLIENT_SECRET=your-ibm-verify-client-secret
# SSO_IBM_VERIFY_ISSUER=https://your-tenant.verify.ibm.com/oidc/endpoint/default
# Okta OIDC
SSO_OKTA_ENABLED=false
# SSO_OKTA_CLIENT_ID=your-okta-client-id
# SSO_OKTA_CLIENT_SECRET=your-okta-client-secret
# SSO_OKTA_ISSUER=https://your-okta-domain.okta.com
# SSO General Settings
SSO_AUTO_CREATE_USERS=true
SSO_PRESERVE_ADMIN_AUTH=true
SSO_REQUIRE_ADMIN_APPROVAL=false
# Enterprise Domain Configuration
# SSO_TRUSTED_DOMAINS=[]
# SSO_AUTO_ADMIN_DOMAINS=[]
# SSO_GITHUB_ADMIN_ORGS=[]
# SSO_GOOGLE_ADMIN_DOMAINS=[]
#####################################
# JWT Configuration Updates
#####################################
# Enhanced JWT configuration with audience and issuer
JWT_AUDIENCE=mcpgateway-api
JWT_ISSUER=mcpgateway
# Asymmetric JWT algorithms (optional, for enterprise deployments)
# JWT_ALGORITHM=RS256 # For RSA public/private key
# JWT_ALGORITHM=ES256 # For ECDSA public/private key
π Database Migration
Migrations run automatically on startup:
:::bash
# Start development server (migrations run automatically)
make dev
# Or for production
make serve
# Verify migration success
curl -s -H "Authorization: Bearer $MCPGATEWAY_BEARER_TOKEN" \
http://127.0.0.1:4444/version | jq
π JWT Token Generation Updates
Update token generation to use email addresses:
:::bash
# Generate development tokens (NEW FORMAT)
export MCPGATEWAY_BEARER_TOKEN=$(python3 -m mcpgateway.utils.create_jwt_token \
--username admin@example.com --exp 10080 --secret my-test-key)
# Test API access
curl -s -H "Authorization: Bearer $MCPGATEWAY_BEARER_TOKEN" \
http://127.0.0.1:4444/version | jq
π Post-Migration Security
-
Change Platform Admin Password:
bash # Use the password change API after migration curl -X POST http://127.0.0.1:4444/auth/email/change-password \ -H "Content-Type: application/json" \ -H "Authorization: Bearer $MCPGATEWAY_BEARER_TOKEN" \ -d '{"old_password": "changeme", "new_password": "your-secure-password"}'
-
Configure SSO (if desired) using the tutorials in documentation
-
Set up Teams and invite users via the Admin UI or API
π Complete Migration Resources
- MIGRATION-0.7.0.md β Detailed step-by-step upgrade guide with troubleshooting
- Multi-Tenancy Architecture β Understanding the new system design
- SSO Configuration Guide β Setting up enterprise authentication
π¨ Breaking Changes
- Database Schema β New multi-tenant tables and extended resource tables (automatically migrated)
- Authentication System β Migration from username to email-based authentication:
- Action Required: Update JWT token generation to use email addresses
- Action Required: Update
.env
with new authentication configuration - API Changes β New endpoints added, existing endpoints enhanced with team parameters:
- Backward Compatible: Existing endpoints work with new team-scoping parameters
- Configuration β New required environment variables for multi-tenancy:
- Action Required: Copy updated
.env.example
and configure multi-tenancy settings
π Issues Closed
Primary Epic: - Closes [#860] - [EPIC]: Complete Enterprise Multi-Tenancy System with Team-Based Resource Scoping
Core Security & Authentication: - Closes [#544] - Database-Backed User Authentication with Argon2id (replace BASIC auth) - Closes [#283] - Role-Based Access Control (RBAC) - User/Team/Global Scopes for full multi-tenancy support - Closes [#426] - Configurable Password and Secret Policy Engine - Closes [#87] - Epic: Secure JWT Token Catalog with Per-User Expiry and Revocation - Closes [#282] - Per-Virtual-Server API Keys with Scoped Access
SSO Integration: - Closes [#220] - Authentication & Authorization - SSO + Identity-Provider Integration - Closes [#278] - Authentication & Authorization - Google SSO Integration Tutorial - Closes [#859] - Authentication & Authorization - IBM Security Verify Enterprise SSO Integration
Database & Infrastructure: - Closes [#925] - Add MySQL database support to MCP Gateway - Closes [#928] - Migrate container base images from UBI9 to UBI10 and Python from 3.11 to 3.12
Multi-Tenancy Implementation: - Closes [#969] - Backend Multi-Tenancy Issues - Critical bugs and missing features - Closes [#967] - UI Gaps in Multi-Tenancy Support - Visibility fields missing for most resource types - Closes [#958] - Incomplete Visibility Implementation - Closes [#955] - Team Selection implementation not tagging or loading added servers, tools, gateways
Bug Fixes & Improvements: - Closes [#949] - Tool invocation for an MCP server authorized by OAUTH2 fails - Closes [#948] - MCP OAUTH2 authenticate server is shown as offline after is added - Closes [#946] - Alembic migrations fails in docker compose setup - Closes [#942] - DateTime UTC Fixes Required - Closes [#941] - Access Token scoping not working - Closes [#931] - Helm install does not work when kubeVersion has vendor specific suffix - Closes [#844] - Creating a new virtual server with a custom UUID, removes the hyphens from the UUID field - Closes [#834] - Existing tool configurations are not updating after changes to the MCP server configuration - Closes [#831] - Newly added or deleted tools are not reflected in Global Tools tab after server reactivation - Closes [#822] - Incorrect _sleep_with_jitter Method Call - Closes [#820] - Unable to create a new server with custom UUID - Closes [#570] - Word wrap in codemirror - Closes [#491] - UI Keyboard shortcuts
Development & Documentation: - Closes [#589] - Sample MCP Server - Python PowerPoint Editor (python-pptx) - Closes [#986] - Plugin Request: Implement Argument Normalizer Plugin (Native) - Closes [#323] - Add Developer Guide for using fast-time-server via JSON-RPC commands using curl or stdio - Closes [#19] - Add Developer Guide for using MCP via the CLI (curl commands, JSON-RPC)
π Release Contributors
This release represents the largest architectural transformation in MCP Gateway's history, implementing comprehensive enterprise multi-tenancy with the largest contributor base to date!
π Top Contributors in 0.7.0
- Mihai Criveti (@crivetimihai) - Release coordination, multi-tenancy architecture design, SSO framework implementation, database migration system, RBAC implementation, team management system, database schema evolution, multi-tenant query optimization and comprehensive testing infrastructure
- Madhav Kandukuri (@madhav165) - RBAC updates and fixes, testing coordination and UI fixes
- Keval Mahajan (@kevalmahajan) - Authentication system fixes, JWT enhancements, password policies, and security validation framework
π New Contributors
Welcome to our growing community of first-time contributors who joined us in 0.7.0:
- Philip Miglinci @pmig added support for JWT asymmetric jwt encoding and decoding [#973] to support dynamic client registration - and added and End-to-End Example on how to use Contextforge with HyprMCP to support MCP client OAuth & DCR with the Context7 MCP server [#1029]
π Resources
- π Docs: https://ibm.github.io/mcp-context-forge/
- π³ Container:
ghcr.io/ibm/mcp-context-forge:v0.7.0
- π PyPI: mcp-contextforge-gateway
- π Full changelog: Compare v0.6.0β¦v0.7.0
- π Migration Guide: MIGRATION-0.7.0.md
Enterprise Software Notice: MCP Gateway v0.7.0 introduces enterprise multi-tenancy. While the core platform is stable, new enterprise features may evolve. Please refer to SECURITY.md and our Roadmap for more info.